Please turn on your JavaScript for this page to function normally.
Digital Forensics for Legal Professionals

Digital Forensics for Legal Professionals provides you with a guide to digital technology forensics in plain English. In the authors’ years of experience in working with …

New module for Metasploit Framework

SecureState released a new auxiliary module for the Metasploit Framework that can reduce the amount of time that it takes to visually fingerprint large amounts of web servers. …

New way of mobile security policy enforcement

AirPatrol unveiled ZoneDefense, a new mobile monitoring and policy enforcement technology that lets enterprises support the use of consumer and mobile devices on premises …

SpyEye source code and crack for the toolkit leaked

Three months after Zeus’ source code has been spotted being sold for small amounts on underground online markets, Xyliton – a French security researcher and member …

IE 9 best option against Web-based malware attacks

Microsoft’s Internet Explorer 9 has proved once again to be the best choice when it comes to catching attacks aimed at making the user download Web-based malware. This …

500% increase in email-attached malware

The UPS name is once again being used to spread vast amounts of email-attached malware. The last week has seen an extraordinary increase – over 5.5 times the average …

Adobe acknowledges the 80 Flash Player bugs found by Google

Following Adobe’s latest release of patches for a number of its products, a discussion was started by Google researcher Tavis Ormandy who claimed that he himself has …

Cybercrime on social networks continues to climb

With malware showing no signs of abating on social networks and continuous news of the privacy implications of sharing personal details through social media, it’s no …

Search engine hack innovation

Attackers are increasingly leveraging the power of search engines, like Google, to successfully carry out automated cyber attacks against vulnerable websites, according to …

Vulnerability in TimThumb WordPress plugins: The effects

With the popularity of the WordPress blogging platform, security researchers here at Websense Security Labs are sure to sit up and take note of any reported zero-day threats …

Consumers keep falling into phishing traps

Whether in the form of fraudulent emails, falsified websites or deceptive text messages, cybercriminals are casting a wider phishing net in the hopes of obtaining personal …

New crypto support for mobile payment issuers

Thales announced software for Hardware Security Modules (HSMs) that enables mobile payment issuers to deliver their mobile payment applications to mobile handsets Over-The-Air …

Don't miss

Cybersecurity news